@mothcompute RAID10 programming.
Two pairs of programmers do pair programming, and then their code is compared.
@mothcompute RAID10 programming.
Two pairs of programmers do pair programming, and then their code is compared.
@mark @jk yet JQuery-based websites were somehow able to load on a netbook with Intel Atom and 1GB of RAM. IIRC you could even load more than one at a time.
@izaya we have Suzuki Cappuccino at home
Suzuki Cappuccino at home:
@merlin what are 1ct transactions?
Also, do people really use 1x1 gifs for anything other than tracking?
@merlin hmn ok
Why are financial transactions of 0.01€ used?
@0x47df I agree with the bring them to the office part, but rack rails are too nice for me to give up :/
@izaya was it a 42" CRT?
@kly I also recommend @HourlyFoxes and @FoxNews
Does anyone here know of a good overview docs / talk / writeup / can give me an infodump of how ACPI works?
@izaya finally a usecase for RGB
@robey I thought the only time you'd use adduser is when writing a pre-install script for a deb package...
@Suiseiseki but the attacker can reprogram the drive to return bytes different than the ones actually on the disc
@Suiseiseki did you know that USB DVD readers have microcontrollers in them, running proprietary software?
@Suiseiseki
> [PERM_WRITE_PROTECT] is implemented by the reader, not the card, so you can just ignore than flag.
Citation needed.
The SD spec says the physical write-protect switch on the side of the card is only implemented by the reader, but that's a separate thing from the PERM_WRITE_PROTECT bit in the CSD register.
1/
@Suiseiseki
> an attacker can [...] dump out all blocks.
not a concnern
> You're better of encrypting the cards with LUKS2
that misses the point.
I need an untrusted computer to be able to read the content of the card, without being able to modify it.
Also, can you stop being patronizing?
Not everyone has the same threat model as you, not everyone is trying to solve the same problem as you, and if LUKS was the answer I would've figured that out myself.
Imagine SD card but the FORCE ERASE command also resets PERM_WRITE_PROTECT
Wait no, that's useless, since a rogue host can read the whole card before erasing it, and then write modified content back.
Damn.
Imagine SD card but with the ability to write-protect it in such a way, that un-write-protecting requires a password.
or I could just buy a bunch of those cards and use the permanent write-protect....
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.